Главная
Study mode:
on
1
Introduction
2
Penetration Testing
3
Surveillance
4
Vulnerability Analysis
5
Vulnerability Analysis Demo
6
Influence Analysis Demo
7
SQL Injection Demo
8
Fishing
9
Passwords
10
Vulnerability Tests
Description:
Explore Chapter 8 of "Introduction to Security and Network Forensics" by Prof Bill Buchanan in this comprehensive lecture. Delve into crucial topics such as penetration testing, surveillance, vulnerability analysis, and influence analysis. Witness practical demonstrations of vulnerability analysis, influence analysis, and SQL injection. Learn about fishing techniques and password security. Gain insights into various vulnerability tests and their importance in network security. For more in-depth information, visit the accompanying website at asecuritybook.com/unit08.html. Note that this video is a corrected version with proper audio sync, replacing the original upload.

Introduction to Security and Network Forensics - Threat Analysis - Lecture 8

Bill Buchanan OBE
Add to list
0:00 / 0:00